Organised crime study reveals that nearly all criminal gangs are now using some form of technology
News Security
WordPress 4.7.3 Updates For Six Security Issues
The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws
Wikileaks Documents Claim CIA Can Hack Samsung TVs, iPhones and iPads
Watching TV but who is watching you? CIA allegedly uses Samsung TVs to spy on citizens
Amazon Hands Over Contested Echo Data In Murder Trial
Amazon has provided prosecutors access to Echo recordings in the latest case to raise questions on the privacy implications of the 'Internet of Things'
StoneDrill Wiper Malware Moving To European Targets
Shamoon malware appears to have evolved into a browser-lurking cyber threat
Whistleblowers Describe Industrial-Scale Indian TalkTalk Scam
Scammers reportedly operating at least three call centres in two Indian cities targeting TalkTalk customers
Google Volunteer Team Patches Thousands Of Open Source Projects
A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016
1.4bn Emails Exposed As Huge Spam Operation Fails To Password Protect Documents
Spammergate: Researchers discover vast database of email addresses and suggestions of cybercrime against spam kings sending 1bn messages a day
ICO To Probe Data Analytics Use In Brexit Campaign
The information commissioner is to investigate whether citizens' data was used illegally by the Leave.eu campaign ahead of the Brexit vote
Coachella Website Hack: 950,000 User Accounts For Sale On The Dark Web
Big data breach shows organisations of all sizes and sectors are open to the attentions of cyber criminals
Kaspersky Lab: 43 Percent Of DDoS Victims Believe Rival Firms Are To Blame
Industrial sabotage was voted more likely than attacks by cyber criminals, disgruntled employees and political conspiracy
132 Android Apps Found To Contain IFrames That Link To Malicious Domains
The hidden IFrames cannot hurt Android devices but acts as a carrier for malicious code
Security Flaws Found In Android Password Managers
The security credentials of Password Managers on Android called into question after discovery of multiple flaws
MWC 2017: Eugene Kaspersky ‘Comes Back From The Future’ To Warn About IoT Security Threats
Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017
Researcher Uses Google Speech Recognition To Bypass Google reCAPTCHA
Researcher has great fun using one of Google's services to bypass another Google service
Yahoo Woes Continue As Hackers Access 32 Million Accounts Using Forged Cookies
Yahoo regulatory filing reveals continued impacts of mass security failings
Talking Android Ransomware Plagues Chinese Users
The malware also attempts to steal user credentials for the Chinese social network QQ
Smart Stuffed Toys Leak Data On 800,000 Users
The CloudPets user database was stored unprotected online, and weak passwords meant hackers could access stored children's messages
Data Stolen From Singapore Military In ‘Carefully Planned’ Cyber Attack
The heist, which officials suggested may have been carried out by a nation-state, extracted only basic data on 850 government users
Google Publishes Second Unpatched Windows 10 Flaw In A Month
Google Zero's latest unpatched bug is ranked 'critical' and could be used to target Windows 10 Edge and Internet Explorer 11
Security Contest Modelled On Mirai Botnet Attack
The first face-to-face round of this year's Cyber Security Challenge UK highlights the risk of insecure IoT connected devices
IT Life: Paul Calatayud, Firemon CTO
Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest tech ever created
NHS Loses Half A Million Patient Documents
The NHS has admitted thousands of patients may have been affected by the loss of records that went undelivered over a period of five years
Cellebrite Now Cracks iPhone 6
Firm involved in the FBI's terrorist iPhone unlocking case admits it can now extract data from the iPhone 6 range
Google Cracks SHA-1 And Calls For New Industry Standard
Google and CWI Institute have been able to create two PDFs that hash to the same SHA-1
Deutsche Telekom Cyber Attack ‘Mastermind’ Arrested At London Airport
The police plan to extradite him to Germany where he could face up to ten years in prison
Dropbox Securitybot Hopes To Combat Alert Fatigue
Securitybot sends a Slack message to employees if unusual or potentially malicious activity is detected
Carbon Black: It’s Time For Next-Gen Endpoint Security
Carbon Black believes now is the time to move on from traditional antivirus (AV) software and embrace the next generation of endpoint security
New Ransomware Campaign Targets The Apple Mac
Mac attack. New ransomware campaign targets Apple Mac users seeking to pirate popular software
IT Life: John McLeod, AlienVault CISO
John McLeod, Chief Information Security Officer at AlienVault, talks about his IT career and the biggest challenges he's facing today